option
Questions
ayuda
daypo
search.php

ERASED TEST, YOU MAY BE INTERESTED ON CASP+ Extra

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CASP+ Extra

Description:
CompTIA CASP+

Author:
TheShed
Other tests from this author

Creation Date: 10/10/2024

Category: Computers

Number of questions: 19
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
A security analyst is investigating unapproved cloud services that are being used in the organization. Which of the following would best allow for discovery of shadow IT? Monitoring for sign-up emails of cloud services Centralizing WAF deployment in the data center Setting up a reverse proxy and web filtering software Performing attack surface analysis.
A company wants to reduce its backup storage requirement and is undertaking a data cleanup project. Which of the following should a security administrator consider first when determining which data should be deleted? Retention schedules Classification levels Sanitization requirements Data labels File size.
An IDS was unable to detect malicious network traffic during a recent security incident, even though all traffic was being sent using HTTPS. As a result, a website used by employees was compromised. Which of the following detection mechanisms would allow the IDS to detect an attack like this one in the future? Deobfuscation Protocol decoding Inspection proxy Digital rights management.
Which of the following is the reason why security engineers often cannot upgrade the security of embedded facility automation systems? They are constrained by available compute. They lack x86-64 processors. They lack EEPROM. They are not logic-bearing devices.
A company is migrating its data center to the cloud. Some hosts had been previously isolated, but a risk assessment convinced the engineering team to reintegrate the systems. Because the systems were isolated, the risk associated with vulnerabilities was low. Which of the following should the security team recommend be performed before migrating these servers to the cloud? Performing patching and hardening Deploying host and network IDS Implementing least functionality and time-based access Creating a honeypot and adding decoy files.
A mobile device hardware manufacturer receives the following requirements from a company that wants to produce and sell a new mobile platform: • The platform should store biometric data. • The platform should prevent unapproved firmware from being loaded. • A tamper-resistant, hardware-based counter should track if unapproved firmware was loaded. Which of the following should the hardware manufacturer implement? (Choose three.) ASLR NX eFuse SED SELinux Secure boot shell restriction Secure enclave.
An analyst reviews the following output collected during the execution of a web application security assessment: Which of the following attacks would be most likely to succeed, given the output? NULL and unauthenticated cipher downgrade attack Availability attack from manipulation of associated authentication data Padding oracle attack On-path forced renegotiation to insecure ciphers.
A security administrator has been provided with three separate certificates and is trying to organize them into a single chain of trust to deploy on a website. Given the following certificate properties: Which of the following are true about the PKI hierarchy? (Choose two.) www.budgetcert.com is the top-level CA. www.budgetcert.com is an intermediate CA. SuperTrust RSA 2018 is the top-level CA. SuperTrust RSA 2018 is an intermediate CA. BudgetCert is the top-level CA. BudgetCert is an intermediate CA.
During a software assurance assessment, an engineer notices the source code contains multiple instances of strcpy, which does not verify the buffer length. Which of the following solutions should be integrated into the SDLC process to reduce future risks? Require custom IDS/IPS detection signatures for each type of insecure function found. Perform a penetration test before moving to the next step of the SDLC. Update the company's secure coding policy to exclude insecure functions. Perform DAST/SAST scanning before handoff to another team.
A software developer needs to add an authentication method to a web application. The following requirements must be met: • The web application needs to use well-supported standards. • The initial login to the web application should rely on an outside, trusted third party. • The login needs to be maintained for up to six months. Which of the following would best support these requirements? (Choose two.) SAML Kerberos JWT RADIUS EAP Remote attestation.
The management team at a company with a large, aging server environment is conducting a server risk assessment in order to create a replacement strategy. The replacement strategy will be based upon the likelihood a server will fail, regardless of the criticality of the application running on a particular server. Which of the following should be used to prioritize the server replacements? SLE MTTR TCO MTBF MSA.
A recent security assessment generated a recommendation to transition Wi-Fi to WPA2/WPA3 Enterprise requiring EAP-TLS. Which of the following conditions must be met for the organization's mobile devices to be able to successfully join the corporate wireless network? Client computer X.509 certificates have been installed. Supplicants are configured to provide a 64-bit authenticator. A hardware TOTP token has been issued to mobile users. The device's IPSec configuration matches the VPN concentrator.
A security analyst is reviewing the following output from a vulnerability scan from an organization's internet-facing web services: Which of the following indicates a susceptibility whereby an attacker can take advantage of the trust relationship between the client and the server? Line 06 Line 10 Line 13 Line 17 Line 18.
A security team receives alerts regarding impossible travel and possible brute-force attacks after normal business hours. After reviewing more logs, the team determines that specific users were targeted and attempts were made to transfer data to an unknown site. Which of the following should the team do to help mitigate these issues? Create a firewall rule to prevent those users from accessing sensitive data. Restrict uploading activity to only authorized sites. Enable packet captures to continue to run for the source and destination related to the file transfer. Disable login activity for those users after business hours.
A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data’s confidentiality is maintained in a dynamic, low-risk environment. Which of the following would best achieve this goal? (Choose two.) Install a SOAR on all endpoints. Hash all files. Install SIEM within a SOC. Encrypt all data and files at rest, in transit, and in use. Configure SOAR to monitor and intercept files and data leaving the network. Implement file integrity monitoring.
As part of an organizational risk assessment, the compliance officer has worked with business unit leaders to identify risks and assess impacts to the organization. Which of the following activities should be performed next? Review risks and assign remediation activities to stakeholders. Mitigate risk by obtaining a cyber insurance policy. Perform a gap analysis against application regulatory requirements. Use a business impact analysis to quantify the ROI for risk mitigation.
A security engineer receives reports through the organization’s bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues. Which of the following is the best approach to uncover additional vulnerable paths in the application? Implement fuzz testing focused on the component and inputs uncovered by the bug bounty program. Leverage a software composition analysis tool to find all known vulnerabilities in dependencies. Use a vulnerability scanner to perform multiple types of network scans to look for vulnerabilities. Utilize a network traffic analyzer to find malicious packet combinations that lead to remote code execution. Run an exploit framework with all payloads against the application to see if it is able to gain access.
A security engineer tests an internal website used to check IP addresses in the network for connectivity by invoking the following URL: http://l92.168.1.43/pingIP.php?IP=10.1.1.1||whoami The engineer obtains the following output: Which of the following improvements should the security engineer recommend? Increasing network throughput SQLi blocking Transport Layer Security Input sanitization.
A security analyst is configuring an IPSec tunnel to use the strongest encryption currently available. Which of the following algorithms should be deployed to provide the most secure initial key exchange? 3DES ECDSA ECDH AES.
Report abuse